Next Article in Journal
Applications of Multi-Criteria Decision Making in Information Systems for Strategic and Operational Decisions
Next Article in Special Issue
A Systematic Literature Review on Load-Balancing Techniques in Fog Computing: Architectures, Strategies, and Emerging Trends
Previous Article in Journal
Utilizing Virtual Worlds for Training Professionals: The Case of Soft Skills Training of Smart City Engineers and Technicians
Previous Article in Special Issue
Efficient Orchestration of Distributed Workloads in Multi-Region Kubernetes Cluster
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems

1
Department of Information Technology, Faculty of Computers and Information, Damanhour University, Damanhour 22511, Egypt
2
Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16273, Saudi Arabia
3
Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
*
Author to whom correspondence should be addressed.
Computers 2025, 14(6), 207; https://doi.org/10.3390/computers14060207
Submission received: 10 April 2025 / Revised: 13 May 2025 / Accepted: 21 May 2025 / Published: 26 May 2025
(This article belongs to the Special Issue Edge and Fog Computing for Internet of Things Systems (2nd Edition))

Abstract

The exponential growth of interconnected devices in the Internet of Things (IoT) has raised significant concerns about data security, especially when transmitting sensitive information over wireless channels. Traditional encryption techniques often fail to meet the energy and processing constraints of resource-limited IoT devices. This paper proposes a novel hybrid security framework that integrates chaotic encryption and steganography to enhance confidentiality, integrity, and resilience in audio communication. Chaotic systems generate unpredictable keys for strong encryption, while steganography conceals the existence of sensitive data within audio signals, adding a covert layer of protection. The proposed approach is evaluated within an Orthogonal Frequency Division Multiplexing (OFDM)-based wireless communication system, widely recognized for its robustness against interference and channel impairments. By combining secure encryption with a practical transmission scheme, this work demonstrates the effectiveness of the proposed hybrid method in realistic IoT environments, achieving high performance in terms of signal integrity, security, and resistance to noise. Simulation results indicate that the OFDM system incorporating chaotic algorithm modes alongside steganography outperforms the chaotic algorithm alone, particularly at higher Eb/No values. Notably, with DCT-OFDM, the chaotic-CFB based on steganography algorithm achieves a performance gain of approximately 30 dB compared to FFT-OFDM and DWT-based systems at Eb/No = 8 dB. These findings suggest that steganography plays a crucial role in enhancing secure transmission, offering greater signal deviation, reduced correlation, a more uniform histogram, and increased resistance to noise, especially in high BER scenarios. This highlights the potential of hybrid cryptographic-steganographic methods in safeguarding sensitive audio information within IoT networks and provides a foundation for future advancements in secure IoT communication systems.

1. Introduction

Wireless communication systems play a crucial role in the IoT by enabling seamless data exchange between interconnected devices, business and networks as shown in Figure 1. These systems eliminate the need for physical wiring, allowing IoT devices such as sensors, smart appliances, and industrial machines to transmit data efficiently over short and long distances. Wireless communication in IoT relies on various technologies, including Wi-Fi, Bluetooth, and cellular networks like 4G and 5G. These technologies ensure IoT devices can function in different environments, from smart homes and industrial automation to healthcare monitoring and smart city infrastructure. A well-structured wireless IoT communication system consists of key components, including edge devices, gateways, cloud platforms, and secure communication protocols. IoT devices collect and transmit data wirelessly to gateways, which act as intermediaries by processing and forwarding the data to cloud servers or edge computing units for real-time analysis. Additionally, security mechanisms like encryption, authentication, and blockchain-based verification safeguard data from cyber threats. These elements collectively enhance the efficiency, scalability, and security of IoT applications, making wireless communication a key enabler of IoT-driven innovations [1,2].
Despite its advantages, wireless IoT communication faces challenges such as signal interference, power consumption, cybersecurity threats, and standardization issues. Many IoT devices operate in crowded frequency bands, leading to potential interference that affects performance. Additionally, battery-powered IoT devices require low-energy communication protocols to extend operational life without frequent recharging. Security concerns are also a major challenge, as IoT networks are vulnerable to cyberattacks, requiring advanced encryption and authentication techniques. Future advancements in 5G, artificial intelligence (AI)-driven network optimization, and cryptography will further enhance the reliability and security of wireless IoT communication. As IoT adoption grows, continuous improvements in wireless communication technologies will play a pivotal role in shaping smart environments, industrial automation, and connected healthcare solutions [3,4].
To clarify the nature of the audio data addressed in this study, the proposed system is evaluated using standard audio and environmental sound samples. These reflect practical IoT scenarios where audio plays a critical role in device interaction and system monitoring. Application examples include smart home assistants that rely on secure voice command processing, industrial IoT systems that monitor machinery sounds for predictive maintenance, and healthcare devices that detect patient distress through ambient audio. These scenarios demand lightweight, secure, and real-time communication—needs effectively addressed by the proposed chaotic-steganography framework. This context has been integrated into both the introduction and system model sections to align the technical solution with its intended real-world applications.
While protocols such as Transport Layer Security (TLS) are widely used to secure conventional internet communications, their suitability for IoT applications, particularly those involving audio transmission, is limited. TLS operates at the transport layer and introduces significant computational and memory overhead due to its handshake mechanisms, certificate-based authentication, and encryption processes. These requirements often exceed the capabilities of many IoT devices, which are typically constrained in terms of power, processing, and storage. Furthermore, TLS secures the communication channel but does not inherently protect the data payload when it is processed, stored, or relayed through intermediate nodes, such as edge gateways or cloud platforms. In contrast, our proposed approach applies security directly at the data level, encrypting and embedding the audio content itself using lightweight chaotic maps and steganography. This ensures the persistent protection of sensitive audio information, regardless of how or where it is transmitted within an IoT network. By addressing both computational feasibility and data-level confidentiality, the hybrid chaotic-steganography method offers a more adaptable and efficient security solution for advanced IoT systems.
This study focuses on how well the proposed cryp-steganography method handles channel degradation offset issues, where it accomplishes both diffusion and permutation at separate phases, respectively. A stegno-map is used later to achieve additional permutation in the steganography technique, while chaotic is utilized in a pre-processing stage to achieve the permutation of the encryption algorithm [5,6]. The primary contributions of this work include the development of a Hybrid Crypto-Steganography Algorithm, which integrates chaotic encryption with steganography to enhance security and data capacity while preserving audio quality. This novel approach mitigates the inherent weaknesses of each technique by leveraging their complementary strengths, significantly increasing the difficulty for intruders to intercept sensitive information in wireless communication systems. Additionally, the study evaluates various OFDM techniques, including Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), to determine the most suitable modulation method. The research prioritizes achieving high encryption efficiency, robust security, and superior audio fidelity in the received data. Furthermore, it examines the impact of common wireless channel impairments, such as Additive White Gaussian Noise (AWGN) and Rayleigh fading, on the system’s performance. By addressing these challenges, the proposed approach ensures a resilient and reliable communication system under realistic wireless conditions.
These contributions collectively aim to advance secure and efficient wireless communication systems by integrating innovative cryptographic techniques with optimized modulation methods. The rest of this work is arranged as follows. Section 2 delves into various related works, Section 3 introduces the steganography architecture, Section 4 introduces baker chaotic map encryption, Section 5 introduces Overview of the CBC, CFB, and OFB modes of operation, and Section 6 introduces the overview of the hybrid crypto-steganography system. In Section 7, encrypted audio transmission with OFDM is discussed, Section 8 explains the quality of encryption metrics or (system evaluation metrics), and Section 9 explains and discusses the simulation results. And finally, the paper reaches conclusions in Section 10.
Recent research has introduced AI-based intrusion detection systems (IDS) and traffic classification methods to enhance IoT security, particularly in smart city and building applications. While these approaches are effective for detecting anomalies and suspicious behavior at the network or transport layer, they often require high computational resources, continuous training, and extensive labeled data—requirements that are not always practical for real-time, resource-constrained IoT deployments. Moreover, these methods focus on traffic behavior rather than directly securing the transmitted content itself. For sensitive audio data, such as voice commands or healthcare-related sounds, there remains a critical need for lightweight, proactive, and data-centric encryption solutions that ensure content confidentiality, even if a network is compromised. The proposed chaotic-steganography framework addresses this gap by embedding security at the data level, thereby complementing and enhancing the protection provided by AI-based systems.

2. Related Works

Several recent studies have explored AI-based threat detection and network security in IoT environments. For instance, research such as characterizing and classifying IoT traffic in smart cities and campuses and the lightweight intrusion detection for Internet of Things-based smart buildings have demonstrated the effectiveness of machine learning in identifying abnormal traffic patterns and potential intrusions. However, these solutions primarily operate at the infrastructure level, focusing on detecting threats through behavioral analysis rather than securing the data themselves. Furthermore, AI-driven models often face limitations in dynamic IoT contexts due to the need for frequent model retraining, high energy consumption, and latency in decision-making. These factors make them less suitable for IoT applications involving real-time audio transmission, where data must be both lightweight and immediately protected from interception.
In contrast, our proposed approach secures the audio payload directly by integrating chaotic encryption with steganography, offering persistent, low-overhead protection that does not rely on detecting threats post hoc. This data-level security complements existing AI-based frameworks and ensures that, even in the event of a detection failure or network compromise, sensitive audio remains protected. Our work thus fills a critical gap by providing embedded, content-specific security for IoT audio data, an area where traditional AI-based network security models fall short.
Goswami and Gupta (2022) [7] explored the growing need for lightweight cryptographic techniques and protocols specifically designed for Internet of Things (IoT) environments. Their work emphasized the limitations of conventional cryptographic methods when applied to resource-constrained IoT devices, which often lack the processing power, memory, and energy to support standard security frameworks. The authors reviewed various lightweight encryption algorithms, including block ciphers, stream ciphers, and hash functions, and discussed their applicability across different IoT use cases. They also highlighted emerging lightweight protocols that maintain a balance between security strength and resource efficiency. This contribution provides a foundational understanding of how tailored cryptographic mechanisms can enhance security in IoT without compromising device performance, and it underscores the need for continued innovation in this domain as IoT ecosystems expand.
In [8], the authors present a comprehensive survey on blockchain-based access control mechanisms specifically tailored for Internet of Things (IoT) environments. The study categorizes and analyzes existing approaches based on their architectural design, consensus mechanisms, and integration strategies. By leveraging blockchain’s decentralized, immutable, and transparent features, these access control models aim to enhance security, reduce reliance on centralized authorities, and improve trust in IoT ecosystems. The authors also discuss the scalability and performance of various blockchain platforms, such as Ethereum and Hyperledger, in managing access control tasks in resource-constrained IoT settings. Their work identifies open research challenges and highlights the need for lightweight blockchain solutions and intelligent access control frameworks, laying a solid foundation for future developments in secure IoT systems.
Thabit et al. [9] explore a range of cryptographic algorithms designed to enhance security in Internet of Things (IoT) environments, with a focus on lightweight and efficient solutions suitable for resource-constrained devices. The study provides a comparative analysis of symmetric and asymmetric encryption techniques, as well as hybrid models that aim to balance security strength and computational overhead. By evaluating various cryptographic schemes in terms of their energy consumption, latency, and adaptability to IoT-specific threats, the authors offer valuable insights into the selection of appropriate encryption methods for different application contexts. Their work contributes significantly to the understanding of secure data transmission in IoT systems and highlights future directions in the development of optimized cryptographic frameworks.
Recent advancements in IoT security have led to the exploration of novel cryptographic techniques. Notably, S. Aqeel et al. [10] proposed a DNA-based lightweight cryptography system, leveraging the complexity of DNA sequences to enhance security. Their work, published in Scientific Reports, demonstrated the potential of bio-inspired approaches in developing efficient and secure cryptographic protocols for IoT applications. This study highlights the growing interest in interdisciplinary solutions for securing IoT ecosystems.

3. Steganography Architecture

Steganography is the art and science of hiding secret information within an ordinary, non-secret file, or message to avoid detection. The block diagram of a steganography system typically consists of three main components: the cover media, the embedding algorithm, and the secret message. The cover media is a file or message that will contain hidden information. This can be an image, audio file, video, or any other type of digital media. The embedding algorithm is the process by which the secret message is hidden within the cover media. This can involve modifying the least significant bits of the cover media to encode the secret message, or using more advanced techniques such as spread spectrum or transform domain methods [5,11,12,13]. The secret message is the information that is being hidden within the cover media. This can be a text message, an audio, a video, or any other type of digital data. The embedding algorithm will ensure that the secret message is imperceptible to the human eye or ear, while still being recoverable by the intended recipient [6].
Digital audio steganography is the practice of hiding a message within a cover audio file. This is achieved by altering the audio data in such a way that the changes are imperceptible to the human ear. The message data are embedded within the cover audio file and can only be extracted using a specific decoding algorithm. This technique is often used for covert communication and can be applied in various scenarios such as secure communication, watermarking, and copyright protection [14,15,16].
Steganography is applied with chaotic code algorithms by embedding secret information within the chaotic dynamics of the algorithm. This can be achieved by manipulating the parameters of the chaotic system to encode the hidden message, making it difficult for unauthorized parties to detect or decipher the embedded information. The chaotic nature of the algorithm adds an extra layer of security to the stenographic process, making it a powerful tool for covert communication and data protection [5,6].
One common method of steganography is using a stego-map, which is a key or code that is used to embed and extract the hidden message from the medium. The relationship between steganography and stego-maps is crucial, as the stego-map is essential for both encoding and decoding the hidden message as shown in Figure 2. Without the stego-map, it would be nearly impossible to retrieve the concealed information from the medium. Therefore, the stego-map plays a vital role in the practice of steganography, as it is the key to unlocking the hidden message [17].

4. Baker Chaotic Map Encryption

An outline of each encryption algorithm’s construction will be provided in this section. The encryption techniques listed below are all symmetric block ciphers. Block indicates that the data (information) to be encrypted are separated into blocks of equal length, whereas symmetric means the key used for encryption and decryption is the same [17,18]. The behavior of some nonlinear dynamic systems that, under some circumstances, display dynamics that are sensitive to initial conditions is described by chaos theory. The sensitivity to beginning conditions and the mixing property are the two fundamental characteristics of chaotic systems.
In this research, the encryption process is controlled by using chaotic maps to generate the chaotic sequence [19]. Several chaotic maps are used to create the chaos streams. Out of all the different maps, four are examined and their features are examined. To develop new symmetric block encryption techniques, this algorithm primarily relies on invertible two-dimensional Baker chaotic maps on tours or on a square. By adding parameters and then discrediting them to represent bits, a chaotic map is generalized. The ciphering map is applied iteratively to the N × N audio in order to encrypt it. The two-dimensional Baker map explains the cipher’s construction and security. The permutations caused by the Baker map are demonstrated to behave like normal random permutations [20,21,22].
The Baker map, B, is described with the following equations:
B(x, y) = (2x, y/2)       When 0 < x < 1/2,
B(x, y) = (2x − 1, y/2 + 1/2)    When 1/2 < x < 1.
In Equations (1) and (2) of the Baker map, the variables x and y represent normalized spatial coordinates within a unit square [0, 1] for both of them.
Where x is the horizontal coordinate of a point in the unit square and y is the vertical coordinate of the same point. Together, (x, y) identifies a specific point in a 2D space (or grid), which corresponds to a data element, such as a pixel in an image or a sample point in audio, depending on the application.
As shown in Figure 3, a similarly discretized form of the fundamental map must be generated because an audio is specified on a lattice of finitely many points (bits). Specifically, a bit must be bijectively assigned to another bit using the discretized map. As the number of bits increases to infinity, the discretized map should get closer to the continuous basic map since it is intended that the discretized map inherit the properties of the basic map [22].

5. Overview of the CBC, CFB, and OFB Modes of Operation

To regulate the relationship between the various blocks that need to be encrypted, the encryption process might employ a variety of modes of operation. This work examines the Cipher Block Chaining (CBC), CFB, and Output Feed Back (OFB) modes [23,24] because they all have data blocks that are dependent on one another.
E P ,   K = C
D C ,   K = P
where Pi is the original, unencrypted data block at position i. Ci is the encrypted version of Pi, Ek(⋅) is the block cipher encryption algorithm applied using key k. Dk(⋅) is the inverse of Ek used to recover the plaintext from the ciphertext. And K is the shared key between sender and receiver in symmetric encryption
The CBC mode is a block cipher technique that encrypts each block or individual unit of input data using a cipher key. A cipher block chaining uses an Initial Vector (IV) of a specific key length. A chaining key technique that relies on every previous cipher-text block is used to decrypt a block cipher of the ciphertext [24,25,26,27]. In Figure 4, the CBC process is displayed.
For CBC encryption, IV is the random or pseudorandom value used to initiate the encryption process, ensuring variability and the bitwise XOR operation (⊕) used to combine two binary sequences, commonly used in block cipher modes to mix plaintext and ciphertext.
C j = E k ( C j 1 P j )
P j =   D k C j C j 1   where   j = 1 ,   2 ,   3 and   C 0 = IV
The CFB is implemented as shown in Figure 5 [27],
C j =   P j I j
P j = C j I j
where, Cj is the ciphertext block at position j, Pj is the plaintext block at position j, Ij = Ek(Cj − 1) is the encrypted output of the previous ciphertext block, C0 = IV is the initialization vector used to start the process, Ek(⋅) denotes the encryption function with secret key k, and ⊕ represents the bitwise XOR operation. This configuration ensures that each ciphertext block depends on all previous plaintext blocks, providing strong diffusion and enhancing security.
The OFB mode is illustrated in Figure 6. In the OFB mode, the encryption concept is described by Equation (9) and the decryption concept is described as [27],
C j =   P j I j
P j =   C j I j   where   I j = E k I j - 1 ,   j = 1 ,   2 ,   3 ,   and   C 0 = IV

6. Overview of the Hybrid Crypto-Steganography System

Crypto-steganography is a method of hiding encrypted messages within non-secret text or data. It involves embedding a secret message within an innocent-looking cover message in such a way that it is difficult for an outsider to detect the presence of the hidden message. The steps involved in crypto-steganography include selecting a cover message, encrypting the secret message, embedding the encrypted message within the cover message, and then transmitting the combined message to the intended recipient. The recipient can then extract the hidden message using the appropriate decryption key. The benefits of crypto-steganography include the ability to securely transmit sensitive information without drawing attention to the fact that a secret message is being sent [28]. This can be particularly useful in situations where privacy and confidentiality are paramount, such as in military communications, intelligence operations, or corporate espionage. Additionally, crypto-steganography can be used to protect digital assets and communications from unauthorized access or interception [29].
The audio signals in the hybrid crypto-steganography system are first encrypted using the hybrid encryption framework, which may be chaotic. Later, they are concealed in the steganography stage by using the chaotic map method once more on the multi-audio map, as shown in Figure 7. The following is a summary of the overall procedures:
  • Use a chaotic technique to encrypt the audio signals (Cryptography stage).
  • To create an additional degree of encryption, various audio signals are encrypted and then mapped into a single audio sample.
  • Use a chaotic map mechanism to randomly generate the new encrypted audio map (Steganography stage).
Figure 7. Overview of the Crypto-steganography system.
Figure 7. Overview of the Crypto-steganography system.
Computers 14 00207 g007
Using the inverse first steganography stage, which can be thought of as a chaotic decryption process, the receiver side applies the inverse of crypto-steganography to extract the original audio signals. The inverse of the cryptography stage will also be a chaotic decryption process.

7. Encrypted Audio Transmission over IoT System

The integration of OFDM in IoT applications has transformed wireless communication by significantly enhancing spectral efficiency, data transmission rates, and overall reliability. As a widely adopted multicarrier modulation technique, OFDM divides the available spectrum into multiple orthogonal subcarriers, enabling simultaneous data transmission while minimizing interference. This capability is particularly advantageous for IoT networks, where devices demand low-latency and high-throughput communication. By leveraging OFDM, wireless connectivity becomes more efficient, facilitating seamless data exchange among numerous smart devices in applications such as home automation, smart industries, and remote healthcare monitoring [28].
To evaluate the practical effectiveness of the proposed secure audio communication system, we integrate the hybrid chaotic-steganography encryption scheme with an Orthogonal Frequency Division Multiplexing (OFDM)-based transmission system. OFDM is a well-established multi-carrier modulation technique used in many modern wireless standards due to its ability to manage channel interference, multipath fading, and spectral efficiency.
In this work, OFDM serves as a testbed for assessing how well the encrypted audio data withstands real-world wireless communication impairments. The encrypted audio signals, generated by the proposed chaotic-steganography framework, are modulated using OFDM and transmitted through simulated wireless channels including Additive White Gaussian Noise (AWGN) and Rayleigh fading conditions.
Key performance indicators such as Peak Signal-to-Noise Ratio (PSNR), bit-level deviation, and correlation are used to measure how well the encrypted data are preserved and recovered after transmission. This approach allows us to demonstrate not only the theoretical security of the proposed encryption technique but also its resilience and robustness in practical IoT transmission scenarios.
Thus, OFDM is not a focal point of innovation in this work but rather a realistic wireless environment used to validate the performance of the proposed secure communication solution.
A key advantage of OFDM in IoT environments is its resilience to multipath fading, a common challenge in wireless communication. IoT devices, often deployed in complex settings such as urban landscapes and industrial facilities, face signal degradation due to reflections and physical obstructions. OFDM effectively mitigates these issues by incorporating cyclic prefixes and subcarrier diversity, ensuring stable and reliable data transmission. Additionally, OFDM supports adaptive modulation and coding schemes, allowing IoT devices to dynamically adjust transmission parameters based on real-time network conditions. This adaptability enhances network performance, improving resistance to interference and congestion, thereby making IoT communications more robust and efficient [22,28,29,30]. Figure 8 shows the System Model for OFDM [22]. In the context of encrypted audio, OFDM can be used to transmit audio data securely over a wireless channel. By encrypting the audio data before they are modulated and transmitted using OFDM, the confidentiality and integrity of the audio can be maintained. This is particularly important in applications such as secure communication systems, where sensitive information needs to be transmitted over a wireless channel. By combining OFDM with encryption techniques such as chaotic encryption algorithm, the audio data can be securely transmitted and received, ensuring that only authorized parties can access and decode the audio.
The block diagram of an IoT based OFDM system comprises several essential components that facilitate the transmission and reception of data. The process begins with the Data Source, where the original data, such as audio or video, are generated. These data are then passed through an Encoder, which applies error correction coding to ensure reliable transmission. Next, the encoded data are fed into a Modulator, where they are divided into multiple parallel streams and modulated onto separate subcarriers using the OFDM technique. The modulated subcarriers are combined using an Inverse Fast Fourier Transform (IFFT) to generate the OFDM signal, which is then prepared for transmission by the RF Front End, including components like amplifiers, filters, and mixers. The OFDM signal is transmitted through a Channel, which may introduce noise and impairments, and is received by the Receiver. At the receiver, the signal is processed by the RF front end and demodulated using FFT to recover the subcarriers. The demodulated data are then passed through a Decoder to correct any transmission errors and reconstruct the original data. Finally, the recovered data are sent to the Data Sink for further processing or playback. This block diagram outlines the sequential flow of data in an OFDM system, highlighting its key stages from data generation to transmission, reception, and recovery [22,30,31,32].

8. Proposed System Evaluation

One of the important parameters in examining the encrypted audio is the tonal distribution inspection where the highly disappeared features of the audio, the better the encryption algorithm. But the tonal distribution inspection dependence only is not enough to judge the complete hiding of the content of the audio signal. So, other calculating and measuring metrics are considered to evaluate the degree of encryption quantitatively [33,34,35,36]. Bit values vary in comparison to their pre-encryption values when an encryption scheme is implemented. This implies that the quality of crypto-steganography (PSNR) and, consequently, the effectiveness of audio encryption, will increase with the change in bit values. Thus, a number of phrases can be used to describe the quality of encryption:
  • Spectrogram and Histogram
  • The deviation (variations) in bit values between the encrypted and original audio.
  • The correlation coefficient.
  • Noise immunity.

8.1. The Spectrogram and Histogram Analysis

It provides a time-frequency representation, allowing a detailed inspection of how signal frequencies vary across the duration of the audio. This method is particularly useful for evaluating the effectiveness of audio encryption algorithms. By comparing the spectrograms of original and encrypted audio files, one can observe how much the frequency content has been altered.
Each bar graph in a histogram shows the frequency of each intensity level in an audio signal, with the vertical axis representing the occurrence density and the horizontal axis representing the intensity-level values. From zero to the number of intensity levels, the horizontal one begins. The frequency with which the intensity level appears in the given audio stream is shown by each bar on the vertical axis [33,34,35,36]. Two characteristics of the histogram for the encrypted audio signal are necessary for audio encryption or the crypto-steganography algorithm:
  • Total difference from the histogram of the original audio signal.
  • Uniform distribution, which means equal probability for all intensity levels.
The effectiveness of the proposed crypto-steganography algorithm is evaluated in Figure 9 using a comparative analysis that includes both spectrogram and histogram visualization techniques. A simulation study was conducted on two distinct datasets, each consisting of nine audio samples, as illustrated in Figure 9. For each audio signal, steganographic and chaotic map keys were utilized as IVs. The spectrogram analysis provides a time-frequency representation of the audio signals, allowing for detailed observation of how encryption alters their spectral content. In the spectrogram of the original audio, clear and continuous frequency components are visible, reflecting the structured nature of unencrypted audio. In contrast, the spectrograms of encrypted signals, particularly those processed using the hybrid crypto-steganography method, exhibit significant spectral distortion or complete destruction of frequency information. This indicates that the proposed algorithm effectively disrupts the original signal’s spectral features, thereby enhancing security and making unauthorized interpretation virtually impossible. Complementing the spectrogram analysis, the histogram evaluation illustrates the distribution of intensity levels in the audio signals. The original audio histograms display distinct, non-uniform patterns indicative of natural audio structure. However, the encrypted audio histograms, especially those produced by the proposed hybrid method, show near-uniform distributions. This flattening effect demonstrates the algorithm’s ability to eliminate detectable patterns and increase randomness. Together, the spectrogram and histogram results confirm the robustness of the proposed crypto-steganography framework in concealing both the time-frequency and amplitude characteristics of the audio, ensuring high-quality encryption and secure transmission.
Figure 9 presents the spectrograms and histograms of audio signals processed using both chaotic encryption algorithms and the proposed hybrid crypto-steganography approach. The spectrogram analysis provides a detailed view of the frequency content of the audio signals over time, allowing for evaluation of how the encryption alters their spectral structure. In the original audio, the spectrogram reveals clear, continuous, and structured frequency patterns, characteristic of an intelligible signal. However, after applying the hybrid crypto-steganography algorithm, the spectrograms display significant distortion and a complete breakdown of these patterns, indicating that the original frequency components have been effectively concealed. This spectral disruption highlights the algorithm’s strength in obscuring the audio content. Complementing the spectrogram analysis, the histogram evaluation illustrates the distribution of amplitude or intensity levels within the audio signals. The original audio exhibits distinct, non-uniform histogram patterns that reflect the natural structure of the signal. In contrast, the histograms of the encrypted audio, particularly when processed using the hybrid crypto-steganography method, appear nearly uniform across all tested scenarios. This flattening of the histogram reflects increased randomness and reduced predictability—key attributes of a robust encryption scheme. Together, the spectrogram and histogram analyses confirm the effectiveness of the proposed framework, demonstrating that the integration of steganography with chaotic encryption significantly enhances the security and imperceptibility of audio data, making it highly suitable for secure transmission in sensitive applications.

8.2. The Deviation Measuring Factor

By maximizing the difference between each value in the original audio signal and its corresponding value in the encrypted audio, the deviation value assesses the strength of the encryption or the cryp-to-steganography process [32,33,34,35,36]. The following is a description of the deviation measurement:
(1)
Histogram estimation of both original and encrypted audios.
(2)
Estimation of the absolute difference between both histograms.
(3)
Estimation of the area under the difference curve as follows:
D = i = 0 255 h i  
where h i is the difference curve’s amplitude expressed as an absolute value at i.
Table 1 displays the deviation results for the various chaotic modes with and without steganography [32,33,34,35,36]. To put it simply, D rises as the encrypted audio deviates more from the original audio.
Table 1 presents the deviation values for three encryption modes—CBC, CFB, and OFB—applied alone and in combination with steganography, tested on two audio files. Across all methods, the deviation slightly increases when steganography is added, with marginally higher values when using different audio files for embedding. Among the encryption modes, CFB combined with steganography (with similar audios) yields the highest deviation, suggesting a slightly greater distortion, while CBC shows the lowest deviation overall.

8.3. Correlation Coefficient Measuring Factor

The stronger the encryption system, the lower the value of the Correlation Coefficient C.C in the encryption process or in the crypto-steganography technique.
C . C = cov ( x , y ) σ x σ y   i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) i = 1 N ( x i E ( x ) ) 2 i = 1 N ( y i E ( y ) ) 2
where ( E ( x ) = 1 N i = 1 N x i ) and x and y are the intensity values of the original and encrypted audios. Measuring the C.C is done through running the C.C built in function using MATLAB 2014software (Corr2). Table 2 shows the deviation result after simulation of the different chaotic modes with and without steganography [27].
Table 2 shows the correlation values for three encryption algorithms (CBC, CFB, and OFB) applied with and without steganography across two audio files. Across all cases, correlation values remain close to zero, indicating minimal statistical dependence between the original and encrypted audio, which is desirable for secure encryption. The addition of steganography introduces slight variations, but no significant correlation is observed. Notably, CFB with steganography (similar audios) yields a small positive correlation for Audio 1, while all other cases exhibit weak negative or near-zero correlations, confirming that encryption and steganography effectively obscure the audio data.

8.4. The Processing Time

According to Table 3 Results, the chaotic with steganography approach requires less processing time. The steganography itself has a very brief actual time. Parallel processing can greatly cut down on this turbulent time.

8.5. Noise Immunity

This test is used to examine the Noise immunity of the algorithm by following the following steps:
(1)
Encrypt the plaintext audio.
(2)
Add the noise to the encrypted audio by increasing Bit Error Rate (BER), in our test; we have used the BER with various values as the following.
(3)
Sending encrypted audio over OFDM channel.
(4)
Calculating PSNR of each chaotic mode and comparing the results with the previous ones.
Figure 10 illustrates how sensitive chaotic encryption with various modes of operation is to the BER. Compared to the other modes, the chaotic-OFB mode is more resilient to noise, while at large value of BER OFB Mode + steganography is the best.

9. Simulation Results

9.1. Simulation Parameters

To evaluate the effectiveness of the proposed secured audio transmission framework, a simulation model was developed that integrates chaotic encryption, steganography, and OFDM-based wireless transmission. The goal is to mimic real-world conditions in IoT environments, particularly under channel impairments such as fading and noise. The system processes audio signals through several stages: encryption using chaotic modes (e.g., CBC), steganographic embedding, modulation via OFDM using various transforms (FFT, DCT, DWT), and transmission over a Rayleigh fading channel. The receiver performs demodulation and decryption to recover the original audio signal, allowing for a quantitative performance assessment using PSNR.
We use the aforementioned modes for audio encryption in our simulations. After encryption, the audio samples are converted to binary and utilized for OFDM modulation. The simulations take Rayleigh fading channels into account. QPSK and 128 subcarriers are employed in all trials. Table 4 provides a summary of the simulation parameters.
We employ the PSNR between the original and decrypted audios, which is defined as follows, to assess the quality of the decrypted audios at the receive
P S N R = 10 log 10 25 5 2 M S E
where the Mean Square Error (MSE) is defined as:
M S E = 1 U 2 i = 1 U j = 1 U f ( i , j ) f ^ ( i , j ) 2
where f ( i , j ) is the original audio of dimensions U and f ^ ( i , j ) is the decrypted audio.

9.2. Chaotic with Steganography Algorithm Based on Similar Audios

The simulation results demonstrate that integrating steganography with chaotic encryption techniques significantly enhances the security and performance of multiplexed audio transmission in OFDM-based IoT systems. Table 5 presents the average PSNR performance for encrypted multiplexed audio streams using hybrid chaotic encryption techniques, both with and without steganography, transmitted over FFT, DCT, and DWT-based OFDM systems under AWGN and fading channels. The analysis covers two levels of Eb/No: 6 dB and 10 dB. The results indicate that higher Eb/No values, particularly at 10 dB, significantly enhance PSNR, often resulting in infinite (Inf) values, which suggest nearly lossless audio transmission. Among the encryption modes, OFB consistently delivers superior performance compared to CBC and CFB, especially in fading environments and when used in conjunction with steganography. Although the inclusion of steganography slightly reduces PSNR at lower Eb/No levels, it maintains high audio quality at 10 dB, demonstrating good noise resilience. Furthermore, DWT-OFDM outperforms FFT and DCT variants in most cases, especially when paired with OFB encryption and steganography, making it the most robust configuration for secure and reliable audio transmission.

9.3. Chaotic with Steganography Algorithm Based on Different Audios

The simulation results demonstrate the effectiveness of the proposed Chaotic-Steganography Algorithm for securing audio transmission in IoT systems across various OFDM configurations (FFT, DCT, and DWT). The PSNR values reveal that integrating steganography with chaotic encryption significantly enhances the transmission quality, particularly under Rayleigh fading conditions. Table 6 presents the average PSNR values for the transmission of nine different encrypted audio streams using the proposed hybrid encryption techniques, with and without steganography, over FFT, DCT, and DWT-based OFDM systems. The results are evaluated under both AWGN and fading channels for two Eb/No levels: 6 dB and 10 dB. As seen in the table, higher Eb/No values (10 dB) consistently yield significantly improved PSNR performance, often reaching infinite values, which indicates near-perfect reconstruction of the audio at the receiver. Among the encryption methods, OFB combined with any OFDM variant—particularly under AWGN—demonstrates the highest PSNR, highlighting its strong resilience to channel noise. The addition of the steganography technique shows a minimal impact on performance at high Eb/No but can slightly reduce PSNR at lower noise conditions. In fading channels, all encryption modes show reduced PSNR compared to AWGN, however, OFB encryption still maintains a clear advantage in signal integrity. Overall, these results confirm that the hybrid approach is robust for transmitting varied audio signals, especially when using OFB mode with DWT-OFDM in low-noise environments.

10. Conclusions

This paper presented a hybrid secure audio transmission system designed specifically for resource-constrained IoT environments. By integrating chaotic encryption with steganography, the system provides dual-layered protection, ensuring both cryptographic security and covert data embedding. This synergy enhances confidentiality, increases resistance to interception, and improves overall communication security. Secured audio transmission framework for IoT systems was proposed, combining chaotic encryption techniques with audio steganography to enhance confidentiality and robustness. The hybrid approach ensures that audio signals are both encrypted for security and embedded with hidden data for an additional layer of protection, making it highly suitable for environments where data integrity and privacy are critical.
To evaluate real-world applicability, the encrypted audio was transmitted over an OFDM-based wireless channel, a standard in modern communication systems. Through extensive testing across various encryption modes and transmission scenarios, the framework demonstrated strong resistance to noise, effective concealment of data, and high audio quality even in challenging channel conditions. The integration of steganography with chaotic systems proved to be an efficient method for concealing information without significantly compromising performance or increasing computational load beyond practical limits. Overall, the proposed framework offers a secure, efficient, and scalable solution for audio communication in IoT applications, ensuring the safe transmission of sensitive audio data over potentially insecure wireless networks. This work lays the groundwork for further development of lightweight, real-time security mechanisms tailored for resource-constrained IoT environments.

Author Contributions

Conceptualization, M.H. and H.T.; methodology, M.H.; software, M.H.; validation, M.H. and H.T formal analysis, H.T. and M.H.; investigation, H.T.; resources, M.H.; data curation, M.H.; writing—original draft preparation, M.H. and H.T.; writing—review and editing, M.H. and H.T; visualization, M.H.; supervision, H.T.; project administration, H.T.; funding acquisition, H.T. All authors have read and agreed to the published version of the manuscript.

Funding

This study is supported via funding from Prince Sattam bin Abdulaziz University project number (PSAU/2025/R/1446).

Data Availability Statement

No new data were created.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  2. Palattella, M.R.; Dohler, M.; Grieco, A.; Rizzo, G.; Torsner, J.; Engel, T.; Ladid, L. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models. IEEE J. Sel. Areas Commun. 2016, 34, 510–527. [Google Scholar] [CrossRef]
  3. Clemente-Lopez, D.; Rangel-Magdaleno, J.d.J.; Muñoz-Pacheco, J.M. A lightweight chaos-based encryption scheme for IoT healthcare systems. Internet Things 2024, 25, 101032. [Google Scholar] [CrossRef]
  4. Shruti, S.; Rani, S.; Shabaz, M.; Dutta, A.K.; Ahmed, E.A. Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing. Alex. Eng. J. 2024, 102, 66–74. [Google Scholar] [CrossRef]
  5. Rahmani, M.K.I.; Arora, K.; Pal, N. A Crypto-steganography: A Survey. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 2014, 5, 149–154. [Google Scholar]
  6. Kamila, N.K.; Rout, H.; Dash, N. Stego-Cryptography Using Chaotic Neural Network. Am. J. Signal Process. 2014, 4, 24–33. [Google Scholar]
  7. Gupta, S.; Saxena, S. Lightweight cryptographic techniques and protocols for IoT. In Proceedings of the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), Bangkok, Thailand, 9–11 September 2022; Gupta, B.B., Ghosh, S.K., Puthal, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2022; pp. 43–58. [Google Scholar]
  8. Gill, S.S.; Ashraf, M.A.S.; Al-Jarrah, O.A.K.; Alazab, M.; Buyya, R. Blockchain-Based Access Control for the Internet of Things: A Survey. IEEE Internet Things J. 2022, 9, 4418–4441. [Google Scholar]
  9. Thabit, F.; Can, Ö.; Aljahdali, A.O.; Al-Gaphari, G.H.; Alkhzaimi, H.A. Cryptography Algorithms for Enhancing IoT Security. Internet Things 2023, 22, 100759. [Google Scholar] [CrossRef]
  10. Aqeel, S.; Khan, A.S.; Abbasi, I.A.; Algarni, F.; Grzonka, D. Enhancing IoT security with a DNA-based lightweight cryptography system. Sci. Rep. 2025, 15, 13367. [Google Scholar] [CrossRef]
  11. Helmy, M.; El-Rabaie, E.-S.M.; Eldokany, I.M.; El-Samie, F.E.A. 3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm. 3D Res. 2017, 8, 38. [Google Scholar] [CrossRef]
  12. Liu, L.; Miao, S. A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 2018, 77, 21445–21462. [Google Scholar] [CrossRef]
  13. Noura, H.; Guyeux, C.; Chehab, A.; Mansour, M.; Couturier, R. Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 2019, 29, 1950059. [Google Scholar] [CrossRef]
  14. Sallam, A.I.; Faragallah, O.S.; El-Rabaie, E.-S.M. HEVC Selective Encryption Using RC6 Block Cipher Technique. IEEE Trans. Multimedia 2017, 20, 1636–1644. [Google Scholar] [CrossRef]
  15. Varshney, S.; Gupta, L.M.; Gupta, A. Performance Analysis of Cryptography Algorithms: Blowfish, DES, 3DES, AES, MARS & RC6 with Data Hiding in Images Using Steganography Technique. Int. J. Innov. Res. Sci. Eng. Technol. 2019, 8. [Google Scholar]
  16. Ali, A.H.; George, L.E.; Zaidan, A.A.; Mokhtar, M.R. High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 2018, 77, 31487–31516. [Google Scholar] [CrossRef]
  17. Helmy, M.; El-Rabaie, E.S.M.; El-Dokany, I.; Abd El-Samie, F.E. A novel cancelable biometrics by Rubik’s algorithm. Opt.-Int. J. Light Electron Opt. 2022, 285, 170475. [Google Scholar] [CrossRef]
  18. Helmy, M.; El-Rabaie, E.-S.M.; Eldokany, I.M.; El-Samie, F.E.A. Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication. Multimed. Tools Appl. 2018, 77, 27337–27361. [Google Scholar] [CrossRef]
  19. Aggarwal, K. Comparison of RC6, modified RC6 & enhancement of RC6. In Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, 19–20 March 2015. [Google Scholar]
  20. Mardiana, F.; Lestari, Y.D.; Khair, U. Modification of RC6 block cipher algorithm on digital image. In Proceedings of the International Conference on Information and Communication Technology (IconICT), Melaka, Malaysia, 17–19 May 2017. [Google Scholar]
  21. Varshney, N.; Raghuwanshi, K. RC6 Based Data Security and Attack Detection. In Proceedings of the First International Conference on Information and Communication Technology for Intelligent Systems; Springer International Publishing: Cham, Switzerland, 2016; pp. 3–10. [Google Scholar]
  22. Faragallah, O.; El-Samie, F.; Ahmed, H.; Elashry, I.; Mai, H.e.l.m.y.; El-Rabaie, E.; Alshebeili, S. Image Encryption: A Communication Perspective; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  23. Adhikari, S.; Karforma, S. A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence. J. Adv. Comput. Res. Int. J. Inf. Technol. 2021, 13, 1463–1471. [Google Scholar] [CrossRef]
  24. Duta, C.L.; Gheorghe, L.; Tapus, N. Real-time DSP Implementations of Voice Encryption Algorithms. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 19–21 February 2017. [Google Scholar]
  25. Sathiyamurthi, P.; Ramakrishnan, S. Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio Speech Music. Process. 2017, 2017, 20. [Google Scholar] [CrossRef]
  26. Stoyanov, B.; Ivanova, T. Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. In Proceedings of the Twenty Second National Radio Science Conference (NRSC 2005), Cairo, Egypt, 15–17 March 2015; p. C11. [Google Scholar]
  27. Eldokany, I.; El-Rabaie, E.-S.M.; Elhalafawy, S.M.; Eldin, M.A.Z.; Shahieen, M.H.; Soliman, N.F.; El-Bendary, M.A.M.; El-Naby, M.A.; Al-Kamali, F.S.; Elashry, I.F.; et al. Efficient Transmission of Encrypted images with OFDM in the Presence of Carrier Frequency Offset. Wirel. Pers. Commun. 2015, 84, 475–521. [Google Scholar] [CrossRef]
  28. Helmy, M. Audio transmission based on hybrid crypto-steganography framework for efficient cyber security in wireless communication system. In Multimedia Tools and Applications; Springer: Berlin/Heidelberg, Germany, 2024; pp. 1–25. [Google Scholar]
  29. Bafna, B.S.; Mutha, B.H.; Gawali, A.D.; Govind, A.J. A Survey on Cryptosteganography: A Multilayer Security Data Hiding. Int. J. Adv. Res. Innov. Ideas Educ. 2015, 1, 346–354. [Google Scholar]
  30. Hilmey, M.; Elhalafwy, S.; Eldin, M. Efficient transmission of chaotic and AES encrypted images with OFDM over an AWGN channel. In Proceedings of the 2009 IEEE International Conference on Computer Engineering & Systems, Cairo, Egypt, 14–16 December 2009; pp. 353–358. [Google Scholar]
  31. Andrews, J.G.; Ghosh, A.; Muhamed, R. Fundamentals of WiMAX Understanding Broadband Wireless Networking; Prentice Hall Communications Engineering and Emerging Technologies Series; Pearson Education: London, UK, 2007; pp. 113–145. [Google Scholar]
  32. Acar, Y.; Çolak, S.A.; Başar, E. Channel estimation for OFDM-IM systems. Turk. J. Electr. Eng. Comput. Sci. 2019, 27, 1908–1921. [Google Scholar] [CrossRef]
  33. Elkamchouchi, H.; Makar, M.A. Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers. In Proceedings of the Twenty Second National Radio Science Conference, Cairo, Egypt, 15–17 March 2005. [Google Scholar]
  34. Helmy, M.; El-Shafai, W.; El-Rabaie, E.-S.M.; El-Dokany, I.M.; El-Samie, F.E.A. A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications. Opt.-Int. J. Light Electron Opt. 2022, 258, 168773. [Google Scholar] [CrossRef]
  35. Helmy, M.; El-Rabaie, E.-S.M.; Eldokany, I.; El-Samie, F.E.A. Proposed Hybrid Encryption Algorithm for Robust 3D Image Communication over Wireless Channels. Optik-Int. J. Light Electron Opt. 2022, 273, 170205. [Google Scholar] [CrossRef]
  36. Alsisi, R.H.; Rao, R.K. BER Comparison of Constant Envelope DCT and FFT Based OFDM with Phase Modulation. In Proceedings of the International Conference on Network-Based Information Systems, Toronto, ON, Canada, 24–26 August 2017; Springer: Cham, Switzerland, 2017; pp. 959–968. [Google Scholar]
Figure 1. IoT architecture.
Figure 1. IoT architecture.
Computers 14 00207 g001
Figure 2. Steganography map for nine audio samples.
Figure 2. Steganography map for nine audio samples.
Computers 14 00207 g002
Figure 3. Chaotic encryption of an 8 × 8 matrix with Skey = (2, 4, 2).
Figure 3. Chaotic encryption of an 8 × 8 matrix with Skey = (2, 4, 2).
Computers 14 00207 g003
Figure 4. The CBC mode.
Figure 4. The CBC mode.
Computers 14 00207 g004
Figure 5. The CFB mode.
Figure 5. The CFB mode.
Computers 14 00207 g005
Figure 6. The OFB mode.
Figure 6. The OFB mode.
Computers 14 00207 g006
Figure 8. Hybrid encrypted audio frameworks transmission over IoT system.
Figure 8. Hybrid encrypted audio frameworks transmission over IoT system.
Computers 14 00207 g008
Figure 9. Encrypted audio and histogram of three “steganography + chaotic” modes.
Figure 9. Encrypted audio and histogram of three “steganography + chaotic” modes.
Computers 14 00207 g009aComputers 14 00207 g009bComputers 14 00207 g009c
Figure 10. (a) PSNR versus BER for encrypted audio transmission over AWGN channel with OFDM system, and (b) PSNR versus BER for encrypted audio transmission over Rayleigh fading channel with IoT system.
Figure 10. (a) PSNR versus BER for encrypted audio transmission over AWGN channel with OFDM system, and (b) PSNR versus BER for encrypted audio transmission over Rayleigh fading channel with IoT system.
Computers 14 00207 g010
Table 1. Deviation results for the different chaotic modes with and without steganography.
Table 1. Deviation results for the different chaotic modes with and without steganography.
Encryption AlgorithmDeviation
Audio 1Audio 2
CBC encryption29.7335.24
CBC + steganography encryption (Similar Audios)29.7935.39
CBC + steganography encryption (Different Audios)29.8735.52
CFB encryption29.9235.63
CFB + steganography encryption (Similar Audios)30.1935.9
CFB + steganography encryption (Different Audios)30.2135.72
OFB encryption29.8535.63
OFB + steganography encryption (Similar Audios)30.0935.74
OFB + steganography encryption (Different Audios)30.0935.74
Table 2. Correlation results for the different chaotic modes with and without steganograph.
Table 2. Correlation results for the different chaotic modes with and without steganograph.
Encryption AlgorithmCorrelation
Audio 1Audio 2
CBC encryption−0.0045 0.0050
CBC + steganography encryption (Similar Audios)−0.0055−0.0098
CBC + steganography encryption (Different Audios)−0.0058−0.0038
CFB encryption−0.0050−0.0015
CFB + steganography encryption (Similar Audios)8.8958 × 10-4−0.0080
CFB + steganography encryption (Different Audios)−0.0068−0.0067
OFB encryption−0.0032−0.0050
OFB + steganography encryption (Similar Audios)−0.0038−0.0033
OFB + steganography encryption (Different Audios)−0.0038−0.0033
Table 3. The processing time for the different chaotic modes with and without steganography/Audio 2.
Table 3. The processing time for the different chaotic modes with and without steganography/Audio 2.
Encryption TechniquesProcessing Time
CBC0.80 s
CBC + steganography (Similar Audios)8.74 s
CBC + steganography (Different Audios)10.03 s
CFB1.06 s
CFB + steganography (Similar Audios)9.49 s
CFB + steganography (Different Audios)10.06 s
OFB3.64 s
OFB + steganography (Similar Audios)8.76 s
OFB + steganography (Different Audios)11.24 s
Table 4. Simulation parameters for the OFDM System.
Table 4. Simulation parameters for the OFDM System.
ParameterDescription
TransmitterSystem bandwidth64 MHz
ModulationQPSK
CP length16 samples
Number of subcarriers128 symbols
Subcarriers spacing500 kHz
Type of transformFFT, DCT, and DWT
Encryption AlgorithmType of encryptionChaotic encryption (CBC mode)
Steganography
Table 5. Average PSNR performance versus different values of Eb/No for the encrypted multiplexed frames with the proposed hybrid encryption techniques (without/with) steganography technique of the similar audios transmission via FFT/DCT/DWT- OFDM system over Ra.
Table 5. Average PSNR performance versus different values of Eb/No for the encrypted multiplexed frames with the proposed hybrid encryption techniques (without/with) steganography technique of the similar audios transmission via FFT/DCT/DWT- OFDM system over Ra.
Multiplexed
Audios of the Nine Different Signal Streams
Without Steganography TechniqueWith Steganography Technique
FFT-OFDM
(Eb/No = 6 dB)
FFT-OFDM
(Eb/No = 10 dB)
DCT-OFDM
(Eb/No = 6 dB)
DCT-OFDM
(Eb/No =10 dB)
DWT-OFDM
(Eb/No = 6 dB)
DWT-OFDM
(Eb/No = 10 dB)
FFT-OFDM
(Eb/No = 6 dB)
FFT-OFDM
(Eb/No = 10 dB)
DCT-OFDM
(Eb/No = 6 dB)
DCT-OFDM
(Eb/No = 10 dB)
DWT-OFDM
(Eb/No = 6 dB)
DWT-OFDM
(Eb/No = 10 dB)
Encrypted with CBC Chaotic
technique/AWGN
33.7096.2935.3396.2933.9396.2934.18Inf33.76Inf33.44Inf
Encrypted with CFB Chaotic
technique/AWGN
34.00Inf36.71Inf34.40Inf33.48Inf33.86Inf33.83Inf
Encrypted with OFB Chaotic
technique/AWGN
36.61Inf38.13Inf37.28Inf36.09Inf35.95Inf35.95Inf
Encrypted with CBC Chaotic
technique/Fading
45.8496.2925.8134.5827.8338.6947.88Inf25.5532.9027.6739.80
Encrypted with CFB Chaotic
technique/Fading
45.61Inf25.2331.9928.4041.6947.32Inf25.7032.4027.8839.51
Encrypted with OFB Chaotic
technique/Fading
47.31Inf32.1034.8237.0042.6151.73Inf31.8235.0636.4544.65
Table 6. Average PSNR performance versus different values of Eb/No for the encrypted multiplexed frames with the proposed hybrid encryption techniques (without/with) steganography technique of the different audios transmission via FFT/DCT/DWT- OFDM system over.
Table 6. Average PSNR performance versus different values of Eb/No for the encrypted multiplexed frames with the proposed hybrid encryption techniques (without/with) steganography technique of the different audios transmission via FFT/DCT/DWT- OFDM system over.
Multiplexed Audios of the Nine Different Signal StreamsWithout Steganography TechniqueWith Steganography Technique
FFT-OFDM
(Eb/No = 6 dB)
FFT-OFDM
(Eb/No = 10 dB)
DCT-OFDM
(Eb/No = 6 dB)
DCT-OFDM
(Eb/No = 10 dB)
DWT-OFDM
(Eb/No = 6 dB)
DWT-OFDM
(Eb/No = 10 dB)
FFT-OFDM
(Eb/No = 6 dB)
FFT-OFDM
(Eb/No = 10 dB)
DCT-OFDM
(Eb/No = 6 dB)
DCT-OFDM
(Eb/No = 10 dB)
DWT-OFDM
(Eb/No = 6 dB)
DWT-OFDM
(Eb/No = 10 dB)
Audio1 ncrypted with CBC Chaotic technique/AWGN33.7096.2935.3396.2933.9396.2933.60Inf35.14Inf33.52Inf
Audio2 encrypted with CFB Chaotic technique/AWGN34.00Inf36.71Inf34.40Inf33.48Inf33.86Inf33.83Inf
Audio3 encrypted with OFB Chaotic technique/AWGN36.61Inf38.13Inf37.28Inf36.09Inf35.95Inf35.95Inf
Audio4 encrypted with CBC Chaotic technique/Fading41.9396.2923.5332.6325.1935.9641.21Inf23.5430.8424.9638.27
Audio5 encrypted with CFB Chaotic technique/Fading40.00Inf23.2931.0225.4039.0441.99Inf23.5931.2224.9137.33
Audio6 encrypted with OFB Chaotic technique/Fading44.00Inf25.5433.6227.6940.4645.73Inf25.7433.9227.5440.70
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Helmy, M.; Torkey, H. Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems. Computers 2025, 14, 207. https://doi.org/10.3390/computers14060207

AMA Style

Helmy M, Torkey H. Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems. Computers. 2025; 14(6):207. https://doi.org/10.3390/computers14060207

Chicago/Turabian Style

Helmy, Mai, and Hanaa Torkey. 2025. "Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems" Computers 14, no. 6: 207. https://doi.org/10.3390/computers14060207

APA Style

Helmy, M., & Torkey, H. (2025). Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems. Computers, 14(6), 207. https://doi.org/10.3390/computers14060207

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop